Priced at $1,000, the Cisco VPN Bruteforcer builds upon the checker’s foundation, maintaining its core technical specifications, such as a native Windows executable in pure C, achieving up to 400 login attempts per second, and utilizing multithreading and modern processor extensions. A threat actor has surfaced on underground forums, allegedly offering tools designed to exploit Cisco VPNs via brute force and credential-checking attacks. These tools, marketed as a “checker” and “bruteforcer,” are tailored to target Cisco VPN services, raising significant cybersecurity concerns for organizations relying on these systems. A watchdog function ensures safe operation during attacks, and crucially, prior use of the Cisco VPN Checker is required to verify targets before purchase, emphasizing a staged approach to security assessments. Organizations using Cisco VPNs must remain vigilant and adopt robust security measures to safeguard their networks against such attacks. Both tools are promoted as high-speed and efficient solutions for cracking Cisco VPN credentials, underscoring their potential threat to corporate networks. Security researchers say brute-force attacks can lead to unauthorized access, account lockouts, or denial-of-service (DoS) conditions due to resource exhaustion on targeted devices. Cyber Security News is a Dedicated News Platform For Cyber News, Cyber Attack News, Hacking News & Vulnerability Analysis. Similar campaigns have targeted Cisco VPNs before, often exploiting weak passwords or configurations lacking multi-factor authentication (MFA). Kaaviya is a Security Editor and fellow reporter with Cyber Security News. Cisco has previously warned about large-scale brute-force attacks targeting its VPN services. Built-in pure C, it achieves speeds of up to 400 attempts per second, leveraging multithreading and modern processor extensions for maximum efficiency. In some cases, attackers use automated tools like the one described by this seller to harvest credentials, which are then sold on dark web markets or used in ransomware operations. The Socket Research Team has discovered a sophisticated malicious PyPI package named 'set-utils' designed to steal Ethereum private keys from unsuspecting developers. The emergence of these tools highlights the persistent threat posed by cybercriminals targeting VPN services.
This Cyber News was published on cybersecuritynews.com. Publication date: Mon, 10 Mar 2025 13:05:12 +0000